This course examines ethical hacking and information systems security auditing. Students will focus on the current security threats, advanced attack vectors, and practical real time demonstration of the latest hacking techniques, methodologies, tools, tricks, and security measures. The course will explore pentesting (Penetration Testing), hacking and securing systems. The lab intensive environment provides students in-depth knowledge and practical experience with the current security systems. Foundational concepts include how perimeter defenses work and scanning and attacking networks. Students will learn how intruders escalate privileges and what steps can be taken to secure information technology system. Content topics include: intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows, and virus creation.